This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
An employee handbook should be the backbone of any organization to provide guidance and clarity on all HR-related items. An HR handbook is a vital resource to help set clear expectations for behavior and performance and helping to foster a positive workplace culture. Contents What is an employee handbook? So let’s dive in!
Hybrid and remote working more prevalent, more and more businesses are re-evaluating how much focus cybersecurity should have. Is cybersecurity top of the agenda? These policies and procedures could be included in the employee handbook, and distributed to all new employees, prior to their first day.
Your Employee Code of Conduct is one of the most important parts of your Employee Handbook. Please ask your attorney to review your finalized policy documents or Handbook. Cybersecurity and digital devices. Contents: Dress code. Internet usage. Cell phone. Corporate email. Social media. Conflict of interest.
Now that the crisis is passing, it’s a great idea to update your employee handbook with post-COVID addendums that include some of the things that worked, and plan for any future contingencies. Here are some suggestions on what to cover and how to incorporate them into your updated post-COVID employee handbook. Cybersecurity .
Include these 20 must-haves in your employee handbook to avoid unnecessary conflicts. Include these must-haves in your employee handbook. When these HR policies appear in the employee handbook, it’s good to start with the company’s goals and values. Make sure your business is fully covered with these essential HR policies.
Along with checking off that they have read the employee handbook and chosen a health plan, knowing the differences between phishing and Trojan horse attacks can often feel like an unnecessary roadblock for new employees starting their first day of “real” work.
Every now and again, a story will hit the headlines about a company that has been the victim of a cybersecurity breach and a little piece of us thinks “how could they be so careless?” Below, we outline the key considerations for a comprehensive cybersecurity training program.
4) Security and Compliance The UK Government’s CyberSecurity Breaches Survey 2022 , found that 4 in 10 businesses reported having any kind of cybersecurity breach or attack in the last 12 months, yet fewer than a quarter of UK businesses (23%) have a formal cybersecurity strategy in place.
Mention the Flex Time Policy in the Employee Handbook It’s a good practice to document all the rules and regulations in an employee handbook to leave no room for confusion and conflicts. Tip: Actively listen to your employee’s inputs, answer their queries, and give clear explanations to help them become acquainted with the schedule.
.” Whatever motivated the resignation, stories like this are a reminder for employers to have strong cyber-security policies in place. I encourage you to head over to Jon Hyman’s Ohio Employer’s Law Blog and read his “ 10 essential cybersecurity training issues.”
It can even include the signing off of various documents such as the company code of conduct, the employee handbook, and sexual harassment training. READ: Have CyberSecurity Concerns Slowed Progress for Cloud Services By its nature, cloud computing technology is developed with security as part of its overall make-up.
via Eric Meyer’s The Employer Handbook Blog. CyberSecurity Best Practices — via Carpe Datum Law. Preventing Sexual Harassment in the Workplace — via GMS Blog. Does the ADA require you to favor minimally-qualified disabled employees over rock-star job applicants? — Threats Of Hanging In The Workplace? — via FisherBroyles.
via Eric Meyer’s The Employer Handbook Blog. Nextchat RECAP: HR and CyberSecurity—Are Employees the Weakest Link? — Update Your Apple Products — or Risk Cyber Spying — via Technologist. Shoddy harassment investigation comes back to bite employer — via Robin Shea’s Employment & Labor Insider. Yes I Can. —
via Eric Meyer’s The Employer Handbook Blog Are fraternities subject to title III of the ADA? — via Privacy and Data Security Insight We Continue to Miss the Texting Opportunity In HR — via The HR Capitalist, Kris Dunn Do Employers Own LinkedIn Groups Created By Employees? He might WIN too. —
We listened to your concerns and spent hours pouring over the M-274 Handbook for Employers and consulting with our HR advisory team to completely revamp our I-9 into the most user-friendly, intuitive, and compliant, digital I-9 available! ” Get your copy of CIO Review which features all 20 of the companies awarded in the HR space.
via Eric Meyer’s The Employer Handbook Blog What employers need to know about transgender discrimination — via EmployerLINC Is Your Federal Contracting Business Covered by OFCCP Affirmative Action Rules? — via The Nation Can a company regulate employee weight and appearance? —
Yesterday morning, I presented Everything You Need to Know About CyberSecurity (in 30 minutes). via Eric Meyer’s The Employer Handbook Blog. This morning I want to say a brief thank you to two organization, each of which hosted me to speak yesterday. Here’s what I read this week. Discrimination. Probably. —
Plus, with cloud-based technology, you don’t have to worry about your software and cyber-security becoming outdated and ineffective. The convenience and added security of a cloud-based system make it the preferred model for most business leaders today. A reliable HCM platform will seamlessly take care of updates for you.
The Definitive Guide to Business Continuity Planning Use this handbook to guide you in developing a BC plan from start to finish, as a tool to test and improve your existing plan, or for anything in between. Address modern threats and trends as you work toward a more globalized strategy. Download The Guide. The post New Year, New Plan?
via Eric Meyer’s The Employer Handbook Blog. 3 Ways to Create a CyberSecurity Culture in Your Workplace — via TalentCulture. Employee Handbooks Represent a Vital Link in the Cybersecurity Chain — via HR Daily Advisor. “Reverse” Race Discrimination is a Thing. Racism” Discrimination is Not. — via The Employment Brief.
Let Me Count the Ways — via Understanding the ADA AutoZone Can’t Confine ADA Suit Over Attendance “Points” System to Three Stores — via Joe’s HR and Benefits Blog Social Media & Workplace Technology Survey: In-House Can’t Handle a Social Media Crisis — via In House Phuc Dat Bich gives Facebook definitive proof his name is real — via Boy Genius (..)
BYOD, cyber-security, and social media). Tuesday I presented a webinar on criminal background checks and Title VII Wednesday I opened the Northern Ohio Labor & Employment Conference with a discussion of emerging technology and employment law (i.e., Thanks to all who invited me to speak to your organizations.
Let me introduce you to the Data Security Policy, an essential component of any employee handbook now, and likely forever. What should an effective Data Security Policy contain? Yesterday, I told you that small businesses (less than 250 employees) suffered 31 percent of last year’s cyberattacks.
Model CyberSecurity Law Pending Final Action By National Association of Insurance Commissioners — via Technology Company Counselor. Court politely tells union where to stick its request to reinstate a member accused of sexual harassment — via Eric Meyer’s The Employer Handbook Blog. Technology. HR & Employee Relations.
3d Cir: Even where old folks are treated fairly, OLDER folks can bring age-bias claims — via Eric Meyer’s The Employer Handbook Blog. Krebs’s Immutable Truths About Data Breaches — via Krebs on Security. CyberSecurity & Employees — via Troutman Sanders HR Law Matters. I hope yours go better than this example.
My phone will start to ring as employers realize that they haven’t updated their handbook since the (first) Bush administration, of haven’t conducted harassment training since before Anita Hill made sexual harassment a household phrase. Cyber-Security. No business is safe from the risk of a cyber-breach. Happy 2015!
I will also chime in on the other three topics (wage-and-hour, FMLA, and cybersecurity). via Eric Meyer’s The Employer Handbook Blog. The webinar runs from 2 - 3:35 pm EST. My topics are LGBT discrimination claims and NLRB for non-union companies. It promises be be an excellent event. Did I mention it’s free?
Social Media & CyberSecurity. via Eric Meyer’s The Employer Handbook Blog. Co-worker’s racial statements may support discrimination claim — via EmployerLINC. Employers Continue to Face Lawsuits Over 100%-Healed Policies — via HR Daily Advisor. A How-To Guide to LGBT Corporate Policies — via FisherBroyles.
We organize all of the trending information in your field so you don't have to. Join 318,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content